blob: 438419ad62129bba70ee1626bc2315b9252a5c84 [file] [log] [blame]
Tom Cherry20391b12015-08-14 13:02:51 -07001service logd /system/bin/logd
Tom Cherry20391b12015-08-14 13:02:51 -07002 socket logd stream 0666 logd logd
3 socket logdr seqpacket 0666 logd logd
Mark Salyzyn54d8ff12017-05-05 15:32:10 -07004 socket logdw dgram+passcred 0222 logd logd
Mark Salyzyne0b8ccd2016-10-27 08:21:35 -07005 file /proc/kmsg r
6 file /dev/kmsg w
Mark Salyzyn77fdb222016-10-28 14:36:36 -07007 user logd
Mark Salyzynd392ac12017-04-27 14:46:31 -07008 group logd system package_info readproc
Luis Hector Chavezd32c36c2018-06-08 15:00:40 -07009 capabilities SYSLOG AUDIT_CONTROL SETGID
Tom Cherry984bd832015-09-21 14:25:34 -070010 writepid /dev/cpuset/system-background/tasks
Tom Cherry20391b12015-08-14 13:02:51 -070011
12service logd-reinit /system/bin/logd --reinit
13 oneshot
14 disabled
Mark Salyzyn5b443402016-10-27 08:34:12 -070015 user logd
16 group logd
Tom Cherry984bd832015-09-21 14:25:34 -070017 writepid /dev/cpuset/system-background/tasks
Mark Salyzyn61e9ce62016-09-12 14:51:54 -070018
Nick Kralevichbe5e4462019-04-09 10:59:39 -070019# Limit SELinux denial generation to 5/second
20service logd-auditctl /system/bin/auditctl -r 5
21 oneshot
22 disabled
23 user logd
24 group logd
25 capabilities AUDIT_CONTROL
26
Mark Salyzyn61e9ce62016-09-12 14:51:54 -070027on fs
28 write /dev/event-log-tags "# content owned by logd
29"
30 chown logd logd /dev/event-log-tags
31 chmod 0644 /dev/event-log-tags
Nick Kralevichbe5e4462019-04-09 10:59:39 -070032
33on property:sys.boot_completed=1
34 start logd-auditctl